Method and system for multiple asymmetric encryption of .Zip files
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.
108 Citations
53 Claims
-
1-24. -24. (canceled)
-
25. A method of placing data in a .ZIP file format data container, said method including:
-
receiving a data file;
encrypting said data file to form an encrypted data file, wherein said encrypting includes symmetrically encrypting said data file using a symmetric key;
generating symmetric key data based on said symmetric key;
asymmetrically encrypting said symmetric key data using a first asymmetric key to form first asymmetric key data;
asymmetrically encrypting said symmetric key data using a second asymmetric key to form second asymmetric key data; and
placing said first asymmetric key data and said second asymmetric key data in a data container, wherein said data container is constructed in accordance with a .Zip file format. - View Dependent Claims (26, 27)
-
-
28. A method of placing data in a .Zip file format data container, said method including:
-
receiving a first data file;
receiving a second data file;
encrypting said first data file to form a first encrypted data file, wherein said encrypting includes symmetrically encrypting said first data file using a first symmetric key;
generating first symmetric key data based on said first symmetric key;
asymmetrically encrypting said first symmetric key data using a first asymmetric key to form first asymmetric key data;
encrypting said second data file to form a second encrypted data file, wherein said encrypting includes symmetrically encrypting said second data file using a second symmetric key;
generating second symmetric key data based on said second symmetric key;
asymmetrically encrypting said second symmetric key data using a second asymmetric key to form second asymmetric key data;
placing said first asymmetric key data and said second asymmetric key data in a data container, wherein said data container is constructed in accordance with a .Zip file format. - View Dependent Claims (29, 30)
-
-
31. A .ZIP file format data container, said data container including:
-
a first set of encrypted data; and
a second set of encrypted data, wherein both said first set of encrypted data and said second set of encrypted data have been encrypted using asymmetric encryption, wherein said data container is constructed in accordance with a .Zip file format. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. A method of placing data in a data container, said method including:
-
receiving a data file;
encrypting said data file to form an encrypted data file, wherein said encrypting includes symmetrically encrypting said data file using a symmetric key;
generating symmetric key data based on said symmetric key;
asymmetrically encrypting said symmetric key data using a first asymmetric key to form first asymmetric key data;
asymmetrically encrypting said symmetric key data using a second asymmetric key to form second asymmetric key data; and
placing said first asymmetric key data and said second asymmetric key data in a data container, wherein said data container is designed for containing compressed files. - View Dependent Claims (39, 40, 41)
-
-
42. A method of placing data in a data container, said method including:
-
receiving a first data file;
receiving a second data file;
encrypting said first data file to form a first encrypted data file, wherein said encrypting includes symmetrically encrypting said first data file using a first symmetric key;
generating first symmetric key data based on said first symmetric key;
asymmetrically encrypting said first symmetric key data using a first asymmetric key to form first asymmetric key data;
encrypting said second data file to form a second encrypted data file, wherein said encrypting includes symmetrically encrypting said second data file using a second symmetric key;
generating second symmetric key data based on said second symmetric key;
asymmetrically encrypting said second symmetric key data using a second asymmetric key to form second asymmetric key data;
placing said first asymmetric key data and said second asymmetric key data in a data container, wherein said data container is designed for containing compressed files. - View Dependent Claims (43, 44, 45)
-
-
46. A data container, said data container including:
-
a first set of encrypted data; and
a second set of encrypted data, wherein both said first set of encrypted data and said second set of encrypted data have been encrypted using asymmetric encryption, wherein said data container is designed for containing compressed files. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53)
-
Specification